ISO/IEC 11770-4
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets AMENDMENT 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
active, Most Current
Buy Now
Organization: | ISO |
Publication Date: | 1 February 2021 |
Status: | active |
Page Count: | 44 |
ICS Code (IT Security): | 35.030 |
Document History

ISO/IEC 11770-4
February 1, 2021
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets AMENDMENT 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
A description is not available for this item.

September 1, 2019
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets AMENDMENT 1: Unbalanced Password- Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKAIBC)
A description is not available for this item.

November 1, 2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of...

September 15, 2009
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets TECHNICAL CORRIGENDUM 1
A description is not available for this item.

May 1, 2006
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
A description is not available for this item.